Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment Error.cmd.exe

Overview

General Information

Sample name:Payment Error.cmd.exe
Analysis ID:1596244
MD5:9dac35c40e2d920ca69f23ba735da601
SHA1:122f12f3cb93b5476bbe3140e3eb6bbe2dfdd5db
SHA256:21214c5b0f0e85bf2b07948dad8992c07025e0c7d32117d34ad899bd1e8d3cbb
Tags:exeuser-threatcat_ch
Infos:

Detection

ReverseShell, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected ReverseShell
Yara detected Snake Keylogger
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Payment Error.cmd.exe (PID: 1416 cmdline: "C:\Users\user\Desktop\Payment Error.cmd.exe" MD5: 9DAC35C40E2D920CA69F23BA735DA601)
    • Payment Error.cmd.exe (PID: 2544 cmdline: "C:\Users\user\Desktop\Payment Error.cmd.exe" MD5: 9DAC35C40E2D920CA69F23BA735DA601)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "omz@omzpnomatik.net", "Password": "Mustafa2023x", "Host": "mail.omzpnomatik.net", "Port": "587", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_ReverseShellYara detected ReverseShellJoe Security
    00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x1487c:$a1: get_encryptedPassword
        • 0x14b68:$a2: get_encryptedUsername
        • 0x14688:$a3: get_timePasswordChanged
        • 0x14783:$a4: get_passwordField
        • 0x14892:$a5: set_encryptedPassword
        • 0x15f07:$a7: get_logins
        • 0x15e6a:$a10: KeyLoggerEventArgs
        • 0x15ad5:$a11: KeyLoggerEventArgsEventHandler
        00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x1820c:$x1: $%SMTPDV$
        • 0x18272:$x2: $#TheHashHere%&
        • 0x19851:$x3: %FTPDV$
        • 0x19945:$x4: $%TelegramDv$
        • 0x15ad5:$x5: KeyLoggerEventArgs
        • 0x15e6a:$x5: KeyLoggerEventArgs
        • 0x19875:$m2: Clipboard Logs ID
        • 0x19a95:$m2: Screenshot Logs ID
        • 0x19ba5:$m2: keystroke Logs ID
        • 0x19e7f:$m3: SnakePW
        • 0x19a6d:$m4: \SnakeKeylogger\
        Click to see the 17 entries
        SourceRuleDescriptionAuthorStrings
        2.2.Payment Error.cmd.exe.400000.0.unpackJoeSecurity_ReverseShellYara detected ReverseShellJoe Security
          2.2.Payment Error.cmd.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.2.Payment Error.cmd.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              2.2.Payment Error.cmd.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                2.2.Payment Error.cmd.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x14a7c:$a1: get_encryptedPassword
                • 0x14d68:$a2: get_encryptedUsername
                • 0x14888:$a3: get_timePasswordChanged
                • 0x14983:$a4: get_passwordField
                • 0x14a92:$a5: set_encryptedPassword
                • 0x16107:$a7: get_logins
                • 0x1606a:$a10: KeyLoggerEventArgs
                • 0x15cd5:$a11: KeyLoggerEventArgsEventHandler
                Click to see the 17 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-21T21:32:00.224972+010028033053Unknown Traffic192.168.2.649713104.21.16.1443TCP
                2025-01-21T21:32:01.578762+010028033053Unknown Traffic192.168.2.649717104.21.16.1443TCP
                2025-01-21T21:32:02.872946+010028033053Unknown Traffic192.168.2.649719104.21.16.1443TCP
                2025-01-21T21:32:04.215916+010028033053Unknown Traffic192.168.2.649723104.21.16.1443TCP
                2025-01-21T21:32:06.860171+010028033053Unknown Traffic192.168.2.649738104.21.16.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-21T21:31:58.743446+010028032742Potentially Bad Traffic192.168.2.649709132.226.247.7380TCP
                2025-01-21T21:31:59.666998+010028032742Potentially Bad Traffic192.168.2.649709132.226.247.7380TCP
                2025-01-21T21:32:00.962222+010028032742Potentially Bad Traffic192.168.2.649715132.226.247.7380TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "omz@omzpnomatik.net", "Password": "Mustafa2023x", "Host": "mail.omzpnomatik.net", "Port": "587", "Version": "5.1"}
                Source: Payment Error.cmd.exeVirustotal: Detection: 51%Perma Link
                Source: Payment Error.cmd.exeReversingLabs: Detection: 31%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Payment Error.cmd.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Payment Error.cmd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.6:49712 version: TLS 1.0
                Source: Payment Error.cmd.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: Payment Error.cmd.exe, 00000000.00000002.4585296144.0000000005F90000.00000004.08000000.00040000.00000000.sdmp, Payment Error.cmd.exe, 00000000.00000002.4583586670.0000000002F51000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: ^value__Lambdaget_VisibleAreaSetVisibleAreaSystem.Windows.Mediaget_XMLSchemaget_SpaceAfterMemoryOperandCommaset_SpaceAfterMemoryOperandCommaSystem.Windows.DataMicrosoft.VisualStudio.Text.DataTDataget_Dataset_Dataget_ExtraDataget_HasExtraDataReadDataget_SearchDecompiledDataset_SearchDecompiledDataGetSerializedDataGetDeserializedDataget_SizeOfInitializedDataget_SizeOfUninitializedDataget_OldDataIResourceDataget_ResourceDataset_ResourceDataBuiltInResourceDataUserResourceDataGetResourceDataBinaryResourceDataReadImageDataGetImageDataCheckCanUpdateDataGetOrCreateDataget_CouldNotDeserializeDataget_BaseOfDataGetStartOfDataAddCustomDataOnCustomDataTryGetCustomDataClearDataget_HasDataGetObjectDataTryGetDataSetDataAddContentDataGetContentDataget_SizeOfRawDataget_PointerToRawDataget_NewDatadnSpy.Contracts.Metadataget_MetadataOverrideMetadataget_ContainsNoMetadataUIPropertyMetadataFrameworkPropertyMetadataget_DeltaPreprocessManipulationDeltaPostprocessManipulationDeltaBufferPositionToRvaget_Cbget_Tabget_ActiveTabset_ActiveTabCloseActiveTabGetOrCreateActiveTabget_IsActiveTabCloseAllButActiveTabget_DefaultIncrementalTabSelectPreviousTabget_DocumentTabset_DocumentTabTryGetDocumentTabSelectNextTabget_NewTabFollowReferenceNewTabget_OpenNewTabset_OpenNewTabOpenEmptyTabdnlib.DotNet.PdbLoadPdbIsCorLibdnlibmscorlibsbftbAffentoPub<>c source: Payment Error.cmd.exe
                Source: Binary string: dnlib.DotNet.Pdb source: Payment Error.cmd.exe
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 015FF1F6h2_2_015FF007
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 015FFB80h2_2_015FF007
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_015FE528
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_015FEB5B
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_015FED3C
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAF009h2_2_05CAED60
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAC041h2_2_05CABD98
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CA1011h2_2_05CA0D60
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAB791h2_2_05CAB4E8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CA0751h2_2_05CA04A0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAE759h2_2_05CAE4B0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CADEA9h2_2_05CADC00
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CADA51h2_2_05CAD7A8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAD1A1h2_2_05CACEF8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAC8F1h2_2_05CAC648
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAF8B9h2_2_05CAF610
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CA1A38h2_2_05CA1610
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CA1A38h2_2_05CA1620
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CA1471h2_2_05CA11C0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAC499h2_2_05CAC1F0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAF461h2_2_05CAF1B8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CABBE9h2_2_05CAB940
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CA1A38h2_2_05CA1966
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAEBB1h2_2_05CAE908
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CA0BB1h2_2_05CA0900
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CA02F1h2_2_05CA0040
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAE301h2_2_05CAE058
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAD5F9h2_2_05CAD350
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CACD49h2_2_05CACAA0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 05CAFD11h2_2_05CAFA68
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D88945h2_2_06D88608
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D86171h2_2_06D85EC8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D85D19h2_2_06D85A70
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D858C1h2_2_06D85618
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D86E79h2_2_06D86BD0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_06D833B8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_06D833A8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D86A21h2_2_06D86778
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D865C9h2_2_06D86320
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D80B99h2_2_06D808F0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D80741h2_2_06D80498
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D87751h2_2_06D874A8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D872FAh2_2_06D87050
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D802E9h2_2_06D80040
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D85441h2_2_06D85198
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D88459h2_2_06D881B0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D88001h2_2_06D87D58
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D80FF1h2_2_06D80D48
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 4x nop then jmp 06D87BA9h2_2_06D87900

                Networking

                barindex
                Source: Yara matchFile source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPE
                Source: global trafficTCP traffic: 192.168.2.6:63656 -> 1.1.1.1:53
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49715 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49709 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49717 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49719 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49723 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49738 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49713 -> 104.21.16.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.6:49712 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003219000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.000000000320A000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031DD000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003121000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031CF000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003219000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.000000000320A000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031EB000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003164000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031DD000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003121000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031CF000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003115000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: Payment Error.cmd.exe, 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003219000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.000000000320A000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003139000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031DD000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031CF000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003219000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.000000000320A000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003164000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031DD000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003121000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031CF000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: Payment Error.cmd.exe, 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003219000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.000000000320A000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003164000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031DD000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031CF000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443

                System Summary

                barindex
                Source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: Payment Error.cmd.exe PID: 1416, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Payment Error.cmd.exe PID: 1416, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: Payment Error.cmd.exe PID: 2544, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Payment Error.cmd.exe PID: 2544, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: initial sampleStatic PE information: Filename: Payment Error.cmd.exe
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 0_2_0145D3240_2_0145D324
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 0_2_07E987F80_2_07E987F8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015F61082_2_015F6108
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015FC1902_2_015FC190
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015FF0072_2_015FF007
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015FB3282_2_015FB328
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015FC4702_2_015FC470
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015FC7512_2_015FC751
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015F98582_2_015F9858
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015F68802_2_015F6880
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015FBBD22_2_015FBBD2
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015FCA312_2_015FCA31
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015F4AD92_2_015F4AD9
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015FBEB02_2_015FBEB0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015F35702_2_015F3570
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015FE5172_2_015FE517
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015FE5282_2_015FE528
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_015FB4F22_2_015FB4F2
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA7D902_2_05CA7D90
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAED602_2_05CAED60
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA84602_2_05CA8460
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA38702_2_05CA3870
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CABD882_2_05CABD88
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CABD982_2_05CABD98
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAED502_2_05CAED50
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA0D512_2_05CA0D51
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA0D602_2_05CA0D60
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAB4D72_2_05CAB4D7
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAB4E82_2_05CAB4E8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA04902_2_05CA0490
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA04A02_2_05CA04A0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAE4A02_2_05CAE4A0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAE4B02_2_05CAE4B0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CADC002_2_05CADC00
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAD7982_2_05CAD798
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAD7A82_2_05CAD7A8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CACEE92_2_05CACEE9
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CACEF82_2_05CACEF8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAC6482_2_05CAC648
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAF6002_2_05CAF600
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAF6102_2_05CAF610
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAC6382_2_05CAC638
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA11C02_2_05CA11C0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAC1E02_2_05CAC1E0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAC1F02_2_05CAC1F0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAF1A92_2_05CAF1A9
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAF1B82_2_05CAF1B8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA11B02_2_05CA11B0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAB9402_2_05CAB940
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAE9082_2_05CAE908
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA09002_2_05CA0900
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAB9302_2_05CAB930
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAE8F82_2_05CAE8F8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA08F02_2_05CA08F0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAE04B2_2_05CAE04B
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA00402_2_05CA0040
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAE0582_2_05CAE058
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA38602_2_05CA3860
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA001C2_2_05CA001C
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA73E82_2_05CA73E8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CADBF12_2_05CADBF1
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAD3402_2_05CAD340
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAD3502_2_05CAD350
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CACAA02_2_05CACAA0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAFA592_2_05CAFA59
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CAFA682_2_05CAFA68
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8B6E82_2_06D8B6E8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8AA582_2_06D8AA58
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8D6702_2_06D8D670
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D886082_2_06D88608
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8C3882_2_06D8C388
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8B0A02_2_06D8B0A0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D88C512_2_06D88C51
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8A4082_2_06D8A408
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8D0282_2_06D8D028
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8C9D82_2_06D8C9D8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D811A02_2_06D811A0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8BD382_2_06D8BD38
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8B6D92_2_06D8B6D9
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D85EC82_2_06D85EC8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D85EB82_2_06D85EB8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8AA482_2_06D8AA48
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D85A702_2_06D85A70
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D85A602_2_06D85A60
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8D6612_2_06D8D661
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D856182_2_06D85618
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D856092_2_06D85609
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D886032_2_06D88603
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D86BD02_2_06D86BD0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D86BC12_2_06D86BC1
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8A3F82_2_06D8A3F8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D833B82_2_06D833B8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D833A82_2_06D833A8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D867782_2_06D86778
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8C3782_2_06D8C378
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D863112_2_06D86311
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D837302_2_06D83730
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D863202_2_06D86320
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D808F02_2_06D808F0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D878F02_2_06D878F0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D808E02_2_06D808E0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D804982_2_06D80498
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D874972_2_06D87497
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D804882_2_06D80488
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D874A82_2_06D874A8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D870502_2_06D87050
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D870492_2_06D87049
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D800402_2_06D80040
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D828182_2_06D82818
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8D0182_2_06D8D018
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D800112_2_06D80011
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D828072_2_06D82807
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D844302_2_06D84430
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8C9C82_2_06D8C9C8
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D851982_2_06D85198
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D811912_2_06D81191
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8518B2_2_06D8518B
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D881B02_2_06D881B0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D881A02_2_06D881A0
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D87D582_2_06D87D58
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D80D482_2_06D80D48
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D87D482_2_06D87D48
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D879002_2_06D87900
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D80D392_2_06D80D39
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_06D8BD282_2_06D8BD28
                Source: Payment Error.cmd.exe, 00000000.00000002.4585296144.0000000005F90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs Payment Error.cmd.exe
                Source: Payment Error.cmd.exe, 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs Payment Error.cmd.exe
                Source: Payment Error.cmd.exe, 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Payment Error.cmd.exe
                Source: Payment Error.cmd.exe, 00000000.00000002.4584933560.0000000005880000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs Payment Error.cmd.exe
                Source: Payment Error.cmd.exe, 00000000.00000002.4583586670.0000000002F51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs Payment Error.cmd.exe
                Source: Payment Error.cmd.exe, 00000000.00000002.4583586670.0000000002F51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Payment Error.cmd.exe
                Source: Payment Error.cmd.exe, 00000000.00000002.4582578269.000000000123E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Payment Error.cmd.exe
                Source: Payment Error.cmd.exe, 00000000.00000000.2117760056.0000000000C2A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFuzio.exe, vs Payment Error.cmd.exe
                Source: Payment Error.cmd.exe, 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Payment Error.cmd.exe
                Source: Payment Error.cmd.exe, 00000002.00000002.4582208823.0000000001167000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Payment Error.cmd.exe
                Source: Payment Error.cmd.exeBinary or memory string: OriginalFilenameFuzio.exe, vs Payment Error.cmd.exe
                Source: Payment Error.cmd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: Payment Error.cmd.exe PID: 1416, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Payment Error.cmd.exe PID: 1416, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: Payment Error.cmd.exe PID: 2544, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Payment Error.cmd.exe PID: 2544, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, DarkListView.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Payment Error.cmd.exe.5880000.4.raw.unpack, DarkListView.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
                Source: 0.2.Payment Error.cmd.exe.5880000.4.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
                Source: classification engineClassification label: mal100.troj.spyw.winEXE@3/0@2/2
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeMutant created: NULL
                Source: Payment Error.cmd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Payment Error.cmd.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Payment Error.cmd.exe, 00000002.00000002.4583642550.0000000003292000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000032B0000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000032D7000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000032E4000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4583642550.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, Payment Error.cmd.exe, 00000002.00000002.4585143338.00000000040E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Payment Error.cmd.exeVirustotal: Detection: 51%
                Source: Payment Error.cmd.exeReversingLabs: Detection: 31%
                Source: Payment Error.cmd.exeString found in binary or memory: <body>)<!--StartFragment-->
                Source: unknownProcess created: C:\Users\user\Desktop\Payment Error.cmd.exe "C:\Users\user\Desktop\Payment Error.cmd.exe"
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess created: C:\Users\user\Desktop\Payment Error.cmd.exe "C:\Users\user\Desktop\Payment Error.cmd.exe"
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess created: C:\Users\user\Desktop\Payment Error.cmd.exe "C:\Users\user\Desktop\Payment Error.cmd.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Payment Error.cmd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Payment Error.cmd.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: Payment Error.cmd.exeStatic file information: File size 1339392 > 1048576
                Source: Payment Error.cmd.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x146600
                Source: Payment Error.cmd.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: Payment Error.cmd.exe, 00000000.00000002.4585296144.0000000005F90000.00000004.08000000.00040000.00000000.sdmp, Payment Error.cmd.exe, 00000000.00000002.4583586670.0000000002F51000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: ^value__Lambdaget_VisibleAreaSetVisibleAreaSystem.Windows.Mediaget_XMLSchemaget_SpaceAfterMemoryOperandCommaset_SpaceAfterMemoryOperandCommaSystem.Windows.DataMicrosoft.VisualStudio.Text.DataTDataget_Dataset_Dataget_ExtraDataget_HasExtraDataReadDataget_SearchDecompiledDataset_SearchDecompiledDataGetSerializedDataGetDeserializedDataget_SizeOfInitializedDataget_SizeOfUninitializedDataget_OldDataIResourceDataget_ResourceDataset_ResourceDataBuiltInResourceDataUserResourceDataGetResourceDataBinaryResourceDataReadImageDataGetImageDataCheckCanUpdateDataGetOrCreateDataget_CouldNotDeserializeDataget_BaseOfDataGetStartOfDataAddCustomDataOnCustomDataTryGetCustomDataClearDataget_HasDataGetObjectDataTryGetDataSetDataAddContentDataGetContentDataget_SizeOfRawDataget_PointerToRawDataget_NewDatadnSpy.Contracts.Metadataget_MetadataOverrideMetadataget_ContainsNoMetadataUIPropertyMetadataFrameworkPropertyMetadataget_DeltaPreprocessManipulationDeltaPostprocessManipulationDeltaBufferPositionToRvaget_Cbget_Tabget_ActiveTabset_ActiveTabCloseActiveTabGetOrCreateActiveTabget_IsActiveTabCloseAllButActiveTabget_DefaultIncrementalTabSelectPreviousTabget_DocumentTabset_DocumentTabTryGetDocumentTabSelectNextTabget_NewTabFollowReferenceNewTabget_OpenNewTabset_OpenNewTabOpenEmptyTabdnlib.DotNet.PdbLoadPdbIsCorLibdnlibmscorlibsbftbAffentoPub<>c source: Payment Error.cmd.exe
                Source: Binary string: dnlib.DotNet.Pdb source: Payment Error.cmd.exe
                Source: Payment Error.cmd.exeStatic PE information: 0x8FB59FDE [Sun May 27 14:40:30 2046 UTC]
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA2E78 push esp; iretd 2_2_05CA2E79
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA2840 push esp; retf 2_2_05CA2AC9
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeMemory allocated: 1450000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeMemory allocated: 2F50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeMemory allocated: 4F50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeMemory allocated: 15F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeMemory allocated: 3060000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeMemory allocated: 1670000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599874Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599313Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599188Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599063Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598953Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598844Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598719Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598607Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598499Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598386Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598280Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598172Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598063Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597938Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597828Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597719Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597594Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597484Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597374Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597266Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597156Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597047Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596938Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596813Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596703Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596593Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596484Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596375Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596265Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596126Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596000Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595750Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595502Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595375Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595266Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595156Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595047Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594938Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594813Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594703Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594594Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594469Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594359Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594250Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594141Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594031Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeWindow / User API: threadDelayed 2009Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeWindow / User API: threadDelayed 7826Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep count: 36 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7036Thread sleep count: 2009 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -599874s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7036Thread sleep count: 7826 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -599766s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -599641s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -599531s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -599422s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -599313s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -599188s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -599063s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -598953s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -598844s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -598719s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -598607s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -598499s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -598386s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -598280s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -598172s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -598063s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -597938s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -597828s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -597719s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -597594s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -597484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -597374s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -597266s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -597156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -597047s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -596938s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -596813s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -596703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -596593s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -596484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -596375s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -596265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -596126s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -596000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -595750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -595502s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -595375s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -595266s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -595156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -595047s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -594938s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -594813s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -594703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -594594s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -594469s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -594359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -594250s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -594141s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exe TID: 7004Thread sleep time: -594031s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599874Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599313Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599188Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 599063Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598953Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598844Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598719Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598607Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598499Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598386Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598280Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598172Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 598063Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597938Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597828Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597719Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597594Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597484Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597374Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597266Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597156Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 597047Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596938Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596813Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596703Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596593Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596484Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596375Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596265Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596126Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 596000Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595750Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595502Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595375Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595266Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595156Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 595047Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594938Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594813Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594703Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594594Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594469Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594359Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594250Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594141Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeThread delayed: delay time: 594031Jump to behavior
                Source: Payment Error.cmd.exe, 00000002.00000002.4582693150.00000000013D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllS
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeCode function: 2_2_05CA7D90 LdrInitializeThunk,2_2_05CA7D90
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeProcess created: C:\Users\user\Desktop\Payment Error.cmd.exe "C:\Users\user\Desktop\Payment Error.cmd.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Users\user\Desktop\Payment Error.cmd.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Users\user\Desktop\Payment Error.cmd.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Payment Error.cmd.exe PID: 1416, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Payment Error.cmd.exe PID: 2544, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4583642550.0000000003227000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4583642550.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Payment Error.cmd.exe PID: 1416, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Payment Error.cmd.exe PID: 2544, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\Payment Error.cmd.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Payment Error.cmd.exe PID: 1416, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Payment Error.cmd.exe PID: 2544, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Payment Error.cmd.exe PID: 1416, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Payment Error.cmd.exe PID: 2544, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.Payment Error.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3ff69d0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment Error.cmd.exe.3fa81a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4582094960.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4583642550.0000000003227000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4583916850.0000000003F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4583642550.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Payment Error.cmd.exe PID: 1416, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Payment Error.cmd.exe PID: 2544, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                11
                Process Injection
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                Query Registry
                Remote Services1
                Email Collection
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                31
                Virtualization/Sandbox Evasion
                LSASS Memory1
                Security Software Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                Process Injection
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Deobfuscate/Decode Files or Information
                NTDS31
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
                Obfuscated Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Timestomp
                Cached Domain Credentials1
                System Network Configuration Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSync13
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.